FINANCIAL INSTRUMENT ONLINE COMMUNICATION SYSTEM
A method and system for managing and facilitating communications among affiliants to financial instruments that otherwise are precluded from directly and optimally interacting via the Street Name...

Using Trust Points To Provide Services
In certain embodiments, processors may operate to establish trust with trust point systems by performing a user authentication, a platform authentication, and an environment authentication. The...

561

US20140053241

Authenticating a Device in a Network
There is disclosed a system for authentication of a device in a network by establishing a second security context between the device and a serving network node when a first security context has...

562

US20090328150

Progressive Pictorial & Motion Based CAPTCHAs
A CAPTCHA system uses images/pictures and/or motion for granting access to a computing system. The images can be culled from examples used in pictorial games, and can progressively presented to...

563

US20120297450

Resource Upload
A method, system and program for uploading a resource from remote storage to a remote service. The method comprises the steps of connecting to the remote service, initiating an upload of the...

APPARATUS AND METHOD FOR ACCESS VALIDATION
One or more techniques for access validation are provided. Access validation may be performed automatically or in real-time. Access validation may be at the resource level or at a sub-resource...

METHOD FOR REALIZING TRUSTED NETWORK MANAGEMENT
A method for realizing trusted network management is provided. A trusted management agent resides on a managed host, and a trusted management system resides on a management host. The trusted...

DYNAMIC TRUST SESSION
A secure session of communication between two entities in a network is disclosed. Using client-server terminology, a client sends a connection-request to a server that authenticates the...

Remote Verification for Configuration Updates
In various embodiments, a control client is configured to determine whether or not the most current configuration profile has been installed within a corresponding mobile device. In particular...

COORDINATION OF MULTIPATH TRAFFIC
In one implementation, traffic in a mobile network is directed across multiple paths to a single cloud server or security server (e.g., a security as a service). The mobile device detects a cloud...

METHODS FOR AUTHENTICATION USING NEAR-FIELD
Authentication methods are used to authenticate, a device1 having an ESN1 (electronic serial number), a device2 having an ESN2, and/or a user of the devices. In one implementation, device1...

Aggregated computer health
An aggregated network-wide status for computer health may be generated by calculating a network health status for each computer on the network, then aggregating the results into a single icon or...

User Validation In A Social Network
A computer implemented method and system is provided for validating a user associated with one or more social networks. A validation platform associated with the social networks is provided. The...